Analysis

  • max time kernel
    111s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 14:22

General

  • Target

    bae078193ba160298102c2cd5c1a46dc3782a486721ca8ca4e8dd3d67d85418e.exe

  • Size

    40KB

  • MD5

    6d6335306100dc9af0afd5891c64c184

  • SHA1

    643ac1c46a3defd2fc393483ec1a6a87cf375949

  • SHA256

    bae078193ba160298102c2cd5c1a46dc3782a486721ca8ca4e8dd3d67d85418e

  • SHA512

    e7ca027ec3b0b3da3bad9a0ee3df78a9ce645cc8efa4e5cd794e81499b7b3893e475903398651be675f7f620f4923edd60016cc77d567b0520ddeb13b4c0d06e

  • SSDEEP

    768:eI5TKX1DhH1Iqk9Mv3BDSmzq38roaF+FcE5omipA2i5:eI5TKRhPkCvJSmU8roaF+FcE2/8

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bae078193ba160298102c2cd5c1a46dc3782a486721ca8ca4e8dd3d67d85418e.exe
    "C:\Users\Admin\AppData\Local\Temp\bae078193ba160298102c2cd5c1a46dc3782a486721ca8ca4e8dd3d67d85418e.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2348
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ping -n 10 127.0.0.1 > NUL && del "C:\Users\Admin\AppData\Local\Temp\bae078193ba160298102c2cd5c1a46dc3782a486721ca8ca4e8dd3d67d85418e.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4104
      • C:\Windows\SysWOW64\PING.EXE
        ping -n 10 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:3724

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2348-133-0x0000000000560000-0x000000000056E000-memory.dmp

    Filesize

    56KB

  • memory/2348-132-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2348-134-0x0000000000560000-0x000000000056E000-memory.dmp

    Filesize

    56KB

  • memory/2348-135-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2348-136-0x0000000000560000-0x000000000056E000-memory.dmp

    Filesize

    56KB

  • memory/2348-138-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/3724-139-0x0000000000000000-mapping.dmp

  • memory/4104-137-0x0000000000000000-mapping.dmp